A highly sophisticated threat actor has stolen tools used by cybersecurity company FireEye to evaluate the security posture of enterprise systems, which unauthorized third-party users could abuse to take control of targeted systems, the Cybersecurity and Infrastructure Security Agency announced yesterday.

CISA recommends cybersecurity practitioners review details on the theft of the FireEye Red Team tools and countermeasures available to minimize the threat. 

This is a really big deal — to say the least. It puts every organization in every sector at risk,” said John Riggi, AHA’s senior advisor for cybersecurity and risk. “It’s equivalent to sophisticated foreign criminals or spies breaking into a highly secure armory and stealing the ‘good guys’ most capable and effective weapons. I can’t emphasize enough to all organizations, especially those that possess sensitive data and research, to implement FireEye’s countermeasures as soon as possible.”  

For more on this and other cybersecurity and risk issues, hospital and health system leaders may contact Riggi at jriggi@aha.org.

Headline
Microsoft announced May 19 that it disrupted operations of Fox Tempest, a threat actor operating as a malware-signing-as-a-service used by cybercriminals to…
Headline
An AHA Cyber & Risk Intel blog by John Riggi, AHA national advisor for cybersecurity and risk, explores what health care leaders need to consider to reduce…
AHA Cyber Intel
Cyberattacks against hospitals, health systems and mission-critical health care third-party providers have surged in recent years. While these attacks often…
Headline
Microsoft Threat Intelligence is warning of a large scale, multistage phishing campaign that disproportionately targeted the health care sector, sending “code…
Headline
The Cybersecurity and Infrastructure Security Agency has launched a new initiative for critical infrastructure to defend against cyberattacks through proactive…
Headline
John Riggi, AHA national advisor for cybersecurity and risk, will moderate a webinar May 5 at 1 p.m. ET that will explore how bad actors are leveraging…